Encryption methods and their applications
DES (Data Encryption Algorithm) (Data Encryption Algorithm)
This coding technique is employed by the US. The late 1960s group known as Lucrix, led by IBM researcher Horst Feistel, created an encryption technology. The US National Institute of Standards and Technology (NIST) invites businesses to establish a standard for civilian usage in 1973. The outcome is LUCIFER’s best guess at a solution. Lucrix uses a 128-bit encryption key and has arranged for the download of a 56-bit key length from US security agency (NSA) experts. In a short period of time, the new Data Encryption Standard (1977) was published and included in the standard application in many fields, particularly the financial sector. As well as
A symmetric cryptographic algorithm that makes use of secret key management is the DES algorithm. Both encryption and decryption employ the same key. Therefore, the DES encryption algorithm must decide whether to move in the other way while decrypting information using the same key algorithm. Like many current symmetric encryption methods, DES makes use of the Feistel encryption architecture. The Feistel structure of the encoding block is split into two parts, only one of which is processed in each case. The action of the second half of the data from the results is based on the spiral structure and is carried out in the subsequent stage of this process.
Even today, traditional systems like VISA, MasterCard, ICC, and other payment processors have a theoretical place for DES encryption.
During the NSA exam, DES changed the coding algorithm (s-box) and did not explain why. But obviously, the reason is that IBM researchers have discovered some secrets that have long been known to the NSA without knowing it. The NSA describes these changes in the form of numbers at the appropriate value made to increase the DES power. To create a unique random mode of DES, a company is not recommended, and these numbers are determined by itself, perhaps this may weaken the password.
These measures are due to encryption born of serious criticism and doubts in the world, allegedly the secret doors of the National Security Agency at DES site. Another criticism is that the key length is reduced to 56 bits instead of 128 bits. The reason for this is that NSA’s computing power will violate 56-bit passwords.
However, the NSA said the 56-bit length was designed to allow easy design of the DES hardware. After a period the NSA is also the result of a misunderstanding that public disclosure of the DES standard but they consider it as a system will only be realized in the hardware so they are trying to reinforce and optimize but publicly published DES behind the publication the standard you want to give regular commercial use, they are powerful encryption that they do not feel comfortable with the market.
The length of the password key determines the security of the password systems. Typically, the specific method has a life of 10 years. DES has been 22 years since 1999 and his life has been extended for several years. It is no longer safe at the organ level. The computational capacity of the security services in many Western countries has broken the DES ciphers in minutes. Additionally, amateur code breakers break the key to look for tens of thousands of PCs to spread over the Internet and get access to the results a few days later at the same time tens of thousands of working computers. The watch password is 256. This is a huge task for a computer, but tens of thousands of computers or very powerful computers can find information for a short time.
tribledes
This is a cryptographic technique created by sequential operation of a standard DES with two or three keys of 112 or 168 bits. When the key field reaches 2 or 2, there is a code that can not be solved today or in the foreseeable future. This “cryptographic” and called the most powerful technical possibilities to solve even the US is not possible.
For this reason, it is desirable to limit its use and dissemination. The United States and many Western countries are restricting exports of crypto systems that are stronger than 40 bits. 40 bits can be cleared by the US NSA for a few seconds, allowing you to listen “in real time”.